An innocent-looking but virus-infected computer uses nothing more than heat signatures to glean data from your air-gapped (non-networked), "off-the-grid" machines that you thought were perfectly safe from prying eyes. And an industrial spy has tapped into your network links to make copies of private documents as they flow around your company.